• Complain

Joshua B. Hill - Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century

Here you can read online Joshua B. Hill - Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2016, publisher: Praeger, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Joshua B. Hill Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century
  • Book:
    Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century
  • Author:
  • Publisher:
    Praeger
  • Genre:
  • Year:
    2016
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of governmentinternational, national, state, and local.


Provides accessible, comprehensive coverage of a complex topic that encompasses identity theft to copyright infringement written for non-technical readers

Pays due attention to important elements of cybercrime that have been largely ignored in the field, especially politics

Supplies examinations of both the domestic and international efforts to combat cybercrime

Serves an ideal text for first-year undergraduate students in criminal justice programs

Joshua B. Hill: author's other books


Who wrote Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century? Find out the surname, the name of the author of the book and a list of all author's works by series.

Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Recent Titles in Praeger Security International Textbooks Essentials of - photo 1

Recent Titles in
Praeger Security International Textbooks

Essentials of Strategic Intelligence

Loch K. Johnson, editor

Essentials of Counterterrorism

James J. F. Forest, editor

Copyright 2016 by Joshua B Hill and Nancy E Marion All rights reserved No - photo 2

Copyright 2016 by Joshua B. Hill and Nancy E. Marion

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except for the inclusion of brief quotations in a review, without prior permission in writing from the publisher.

Library of Congress Cataloging-in-Publication Data

Names: Hill, Joshua. | Marion, Nancy E.

Title: Introduction to cybercrime : computer crimes, laws, and policing in the 21st century / Joshua B. Hill, Nancy E. Marion.

Description: Santa Barbara, CA : Praeger, 2016. | Series: Praeger security international textbook | Includes bibliographical references.

Identifiers: LCCN 2015036592| ISBN 9781440832734 (hardback) | ISBN 9781440835339 (paperback) | ISBN 9781440832741 (ebook)

Subjects: LCSH: Computer crimes. | Computer crimesPrevention. | InternetSecurity measures. | BISAC: COMPUTERS / Internet / Security. | LAW / Communications.

Classification: LCC HV6773 .H554 2016 | DDC 364.16/8--dc23 LC record available at http://lccn.loc.gov/2015036592

ISBN: 978-1-4408-3273-4

Paperback ISBN: 978-1-4408-3533-9

EISBN: 978-1-4408-3274-1

201918171612345

This book is also available on the World Wide Web as an eBook.

Visit www.abc-clio.com for details.

Praeger

An Imprint of ABC-CLIO, LLC

ABC-CLIO, LLC

130 Cremona Drive, P.O. Box 1911

Santa Barbara, California 93116-1911

This book is printed on acid-free paper Picture 3

Manufactured in the United States of America

To Madeline Noca Francis-Hill!

Contents

CHAPTER ONE

Introduction

Introduction: Target Breach

IN DECEMBER 2013, AT THE PEAK OF THE holiday shopping season, U.S. retailer Target announced that the company had suffered a major security breach and that, as a result, about 40 million customers had their payment card details stolen (including their card numbers, expiration dates, CVV security codes, and PINs), and another 70 million customers were at risk of losing personal records such as email addresses. Those responsible for the theft could, in turn, sell the stolen information on the black market where it could be used to cause further damage to the original victims. Target officials attempted to diminish the impact of the damage by reporting that the stolen PIN data was encrypted at the terminal as the customer entered their information, and that the encryption key was not stored on Targets systems but instead by the payment processor. Since the key was not stolen in the breach, the possible danger to victims was limited, according to Target.

It was later discovered that the information was stolen using Kaptoxa malware (a derivative of BlackPOS, a point of sale malware) that had been installed on Targets point-of-sale terminals. BlackPOS was originally created by a 17-year-old hacker from Russia who sold the software to cybercriminals. These criminals then used the software to carry out cyberattacks on merchants. The attackers used credentials that they had stolen from a heating, ventilation, and air conditioning supplier, Fazio Mechanical Services, that had access for business reasons (i.e., electronic billing, contract submission and project management). Once the malware was installed on Targets machines, it went undetected for about 19 days, during which time the criminals continued to collect customers data.

The attack on Target occurred in two stages. In the first, the hackers installed the malware on only a limited number of Targets point-of-sale systems as a way to test the software and see if it worked. After that, the

The effects of the crime were far reaching. For Target itself, the breach led to a 46 percent drop in net profits during a critical holiday shopping season.

Other ramifications were seen in the company. In March 2014, the chief information officer of Target, Beth Jacob, announced her resignation. Company officials replaced her with a new chief information security officer. Target has also made changes to its security and technology divisions and improved its cash registers. MasterCard and other card companies have increased security on credit cards by adding microchips to credit and debit cards that are almost impossible to copy. Moreover, when a user makes a purchase with a card, the chips in the card allows for a code that is used only one time. So the data, if stolen, is useless to anyone else.

But the effects of the Target breach were much wider. Not long after the attacks, two banks (Green Bank from Houston, Texas, and Trustmaker National Bank from New York) announced that they had plans to sue Target as well as Trustwave, a security firm that was supposed to ensure security at Target. Officials from the banks explained that Trustwave failed to protect Targets customer data and that they were forced to spend $172 million to replace customer payment cards that had been compromised during the breach.

A settlement in April 2015 addressed these concerns. Target agreed to set aside up to $19 million for banks and credit unions that had issued the MasterCards involved in the breach and had to reissue the cards. The money would help the banks pay for the operating costs and losses on the cards that were affected. Not all banks were happy with the settlement, however. Smaller banks, which are typically forced to pay more for reissuing fees, wanted to see a higher settlement.

Unfortunately, data shows that an increasing number of computer systems have been infected with the Kaptoxa malware that was used in the Clearly this means that any company could become a victim of a cyberattack at any time, and such an attack would affect thousands of individuals alongside the targeted company.

Breaches like the one Target faced are not unusual in todays world. Cyberattacks appear in many forms and range from relatively harmless (such as changing the content on a website) to perilous (such as data being stolen and used to steal identities or trade secrets). Any organization, public or private, may be victimized by cybercriminals. Government agencies at all levels (federal, state, or local) have been victimized. Large and small companies in the United States and globally have had data stolen. Private individuals have also been victimized by cybercriminals. In essence, anyone who relies on a computer for daily activities can become a victim.

These attacks can cause great harm to business and individuals alike, including financial ruin and other long-term problems. In many of these attacks, victims have lost sensitive and confidential information, such as personal data and company secrets, leading to identity theft and monetary losses. Businesses have suffered not only from financial losses but also from damages related to lost business secrets and strategies. Government sites and politicians accounts have been hacked, and the hackers have released political secrets to the public that resulted in tense relationships on the international front. Once victimized, individuals, businesses, and governments must pay thousands of dollars in response to these attacks as they attempt to recover.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century»

Look at similar books to Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century»

Discussion, reviews of the book Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.